The hashing algorithm of ChurchCRM v4.5.3 utilizes a non-random salt value which allows attackers to use precomputed hash tables or dictionary attacks to crack the hashed passwords.
References
Link Resource
https://github.com/ChurchCRM/CRM/issues/6449 Exploit Issue Tracking Third Party Advisory
History

No history.

cve-icon MITRE Information

Status: PUBLISHED

Assigner: mitre

Published: 2023-04-04T00:00:00

Updated: 2023-04-04T00:00:00

Reserved: 2023-02-27T00:00:00


Link: CVE-2023-26855

JSON object: View

cve-icon NVD Information

Status : Analyzed

Published: 2023-04-04T02:15:07.113

Modified: 2023-04-10T19:07:39.067


Link: CVE-2023-26855

JSON object: View

cve-icon Redhat Information

No data.

CWE